CompTIA 220-1002 CompTIA A+ Certification Exam: Core 2 Online Training
CompTIA 220-1002 Online Training
The questions for 220-1002 were last updated at Jan 07,2025.
- Exam Code: 220-1002
- Exam Name: CompTIA A+ Certification Exam: Core 2
- Certification Provider: CompTIA
- Latest update: Jan 07,2025
A new company policy states that all end-user access to network resources will be controlled based on the users’ roles and responsibilities within the organization.
Which of the following security concepts has the company just enabled?
- A . Certificates
- B . Least privilege
- C . Directory permissions
- D . Blacklists
A technician is in the process of upgrading Windows 8 to Windows 10. The technician needs to make sure all of the applications, user profiles, documents, and PST files are preserved.
Which of the following methods would the technician MOST likely perform on the computer?
- A . Unattended installation
- B . Refresh upgrade
- C . Clean installation
D In-place upgrade
A new business will be using credit cards in a physical location as well as its web presence.
Which of the following does the business need?
- A . PHI certification
- B . PCI compliance
- C . POTS implementation
- D . PII filtering
A technician is installing a private PC in a public workspace.
Which of the following password practices should the technician implement on the PC to secure network access?
- A . Remove the guest account from the administrators group
- B . Disable single sign-on
- C . Issue a default strong password for all users
- D . Require authentication on wake-up
A company has hired a new IT firm to manage its network switches and routers.
The firm is geographically separated from the company and will need to able to securely access the devices.
Which of the following will provide the ability to access these devices?
- A . Telnet
- B . SSH
- C . RDP
- D . VNC
A technician responds to a call from a user who claims to have a virus on a workstation.
The technician observes the following notification from the system tray:
There are 1033 infected files on this computer. Click here to disinfect.
The link is blocked by the corporate content filter and displays a message stating the site contains known malware.
Which of the following should the technician complete to secure the computer with MINIMAL impact to the user?
- A . Compare the startup items and services to a known clean image, and remove any startup items not found in the other image. Run an anti-malware scan.
- B . Validate that the alerts are false positives, and disable security software on the workstation to prevent further false notifications.
- C . Back up the user’s files. Restore the system to the original system image designated by corporate IT policies. Restore the user’s files.
- D . Request a content filter exception to allow access to the link from the notification. Once available, follow the instructions on the linked site.
A user is trying to install a very large .dmg file on a Windows computer but is receiving an error message.
Which of the following is causing the error?
- A . Small hard drive
- B . Insufficient RAM
- C . OS compatibility
- D . Folder permissions
Joe, a customer, calls a technician to report a remote computer is demonstrate erratic behavior while he is working on it. The technician verifies the files and directories Joe is working on locally cannot be open in any application, and the computer is extremely slow.
Which of the following is the MOST likely cause of this issue?
- A . Files disappearing
- B . File permission changes
- C . Application crash
- D . Too many start items
A SOHO user reports desktop applications are performing slowly, and no emails have been received all morning. A technician remotes in and determines Internet pages’ load slowly or not at all, CPU performance is normal, and the local router can successfully ping.
The remote connection drops periodically.
Which of the following steps should the technician take NEXT to resolve the problem?
- A . Reboot into safe mode, uninstall the latest OS update, and run a repair on the OS
- B . Update the antivirus software, run an antivirus scan, verify the browser settings, and check all email settings
- C . Reboot to BIOS setup, verify the TPM is enabled, and start a System Restore from safe mode
- D . Send a test email, open a command prompt to check the file system, and empty the browser cache
A technician is setting up a kiosk. The technician needs to ensure the kiosk is secure and users will have access to only the application needed for customer interaction. The technician must also ensure that whenever the computer is rebooted or powered on it logs on automatically without a password.
Which of the following account types would the technician MOST likely set up on this kiosk machine?
- A . Guest
- B . Administrator
- C . Power User
- D . Remote Desktop User
GREAT